Future Internet2015, 7(1), 50-66; doi:10.3390/fi7010050 - published 2 March 2015 Show/Hide Abstract
Abstract: This study used observation and interviews with participants in “PunCar Action” to understand how participatory design methods can be applied to the education of rural individuals in information and communication technology (ICT). PunCar Action is a volunteer program in which ICT educators tour the rural communities of Taiwan, offering courses on the use of digital technology. This paper makes three contributions: First, we found that participatory design is an excellent way to teach ICT and Web 2.0 skills, co-create community blogs, and sustain intrinsic motivation to use Web applications. Second, PunCar Action provides an innovative bottom-up intergenerational ICT education model with high penetrability capable of enhancing the confidence of rural residents in the use of ICT. Third, the content of basic courses was based on applications capable of making the lives of elderly individuals more convenient, and the advanced course was based on the co-creation of community blogs aimed at reviving the core functions of communities and expanding local industry. Our research was conducted with the use of a non-quantitative index to measure ICT learning performance of participants from a rural community. The results show that PunCar Action emphasizes interpersonal communication and informational applications and creates a collaborative process that encourages rural residents to take action to close the digital divide.
Future Internet2015, 7(1), 26-49; doi:10.3390/fi7010026 - published 3 February 2015 Show/Hide Abstract
Abstract: The significance of approaches to technology-enhanced learning (TEL) has increased rapidly during the last few years. Nowadays in education different approaches such as game-based learning, web-based learning, video-based online courses, and many others are used on a daily basis. However, what defines the success of technology-enhanced learning approaches and how can such approaches be developed in a structured way? Furthermore, what different aspects have to be considered while doing so? To answer these questions, 4567 publications were analyzed in this present literature review in order to recognize the different aspects of implementing technology-enhanced learning approaches. Finally, 20 categories are defined in four main areas that summarize all the aspects in the field of technology-enhanced learning. Moreover, the study also reveals research areas that are important but hardly investigated in the observed journals of this study.
Future Internet2015, 7(1), 1-23; doi:10.3390/fi7010001 - published 5 January 2015 Show/Hide Abstract
Abstract: Different languages imply different visions of space, so that terminologies are different in geographic ontologies. In addition to their geometric shapes, geographic features have names, sometimes different in diverse languages. In addition, the role of gazetteers, as dictionaries of place names (toponyms), is to maintain relations between place names and location. The scope of geographic information retrieval is to search for geographic information not against a database, but against the whole Internet: but the Internet stores information in different languages, and it is of paramount importance not to remain stuck to a unique language. In this paper, our first step is to clarify the links between geographic objects as computer representations of geographic features, ontologies and gazetteers designed in various languages. Then, we propose some inference rules for matching not only types, but also relations in geographic ontologies with the assistance of gazetteers.
Future Internet2014, 6(4), 773-799; doi:10.3390/fi6040773 - published 10 December 2014 Show/Hide Abstract
Abstract: Given the existing divide related to Internet skills and types of Internet use, it is safe to assume that a large proportion of the population uses the Internet for health purposes in a partially productive fashion. We suggest that in addition to user characteristics, another factor that inhibits productive Internet use, and thus contributes to the existing gap, is related to the ways in which the technology is configured. The goal of this study was to explore the processes that webmasters and content managers use for constructing and producing, or selecting content, for health websites. Interviews conducted with 23 website builders and managers of websites that represent public and non-public health organizations revealed that they do not plan or conduct activities for content needs elicitation, either in the design stage or on an ongoing basis. Rather, these professionals rely on a “self-embodiment” standard, whereby their and their cohorts’ expectations determine the quality and functionality of the websites’ structure and content. Hence, target groups beyond their social sphere are disregarded, and instead of new opportunities, new cleavages are created. We recommended that government, public and non-public stakeholders work to establish construction standards, to ensure that health websites meet the needs of varied end-user populations.
Future Internet2014, 6(4), 760-772; doi:10.3390/fi6040760 - published 27 November 2014 Show/Hide Abstract
Abstract: Despite the number of tools created to help end-users reduce risky security behaviours, users are still falling victim to online attacks. This paper proposes a browser extension utilising affective feedback to provide warnings on detection of risky behaviour. The paper provides an overview of behaviour considered to be risky, explaining potential threats users may face online. Existing tools developed to reduce risky security behaviours in end-users have been compared, discussing the success rates of various methodologies. Ongoing research is described which attempts to educate users regarding the risks and consequences of poor security behaviour by providing the appropriate feedback on the automatic recognition of risky behaviour. The paper concludes that a solution utilising a browser extension is a suitable method of monitoring potentially risky security behaviour. Ultimately, future work seeks to implement an affective feedback mechanism within the browser extension with the aim of improving security awareness.